• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2013, Vol. 35 ›› Issue (8): 36-40.

• 论文 • Previous Articles     Next Articles

Highefficient identitybased threshold signature scheme         

ZHENG Guangliang1,WEI Lixian1,2,WANG Xuan1   

  1. (1.Key Laboratory of Network & Information Security under the Chinese Armed Police Force,
    Electronic Department,Engineering College of the Armed Police Force,Xi’an 710086;
    2.Institute of Information Security,Engineering College of Chinese Armed Police Force,Xi’an 710086,China)
  • Received:2012-10-26 Revised:2013-01-21 Online:2013-08-25 Published:2013-08-25

Abstract:

Based on the signature scheme proposed by Guke, a new IDbased threshold signature scheme is designed, which is efficient and provably secure in the standard model (without random oracle). The generation of the threshold key does not require a trusted third party. The new scheme improves efficiency by reducing multiplicative operations and bilinear pairing operations, especially by precomputing bilinear pairing operation. And the new scheme is against existential forgery under the adaptive chosen message attack under the computation DiffieHellman assumption in the standard model. Compared with the current IDbased threshold signature scheme, the new one is more computational efficient.

Key words: threshold signature;standard model;CDHproblem;provable security